Realizing the potential benefits of using a wider range of devices with a lighter management approach, some companies have adopted the option of allowing users to choose their own device, based on minimum requirements, which are then managed using an MDM solution. The user is still expected to follow the acceptable use policy, but may also use the device for some personal use. This option provides a balance between end user mobility and information security, but does not relieve the burden of cost that BYOD can provide.
As discussed in Chapter 3, User Account Administration, one of the biggest risks to any IT system is when a user has local administrative access to their computer and can install software or make configuration changes that may weaken the security and integrity of the system, either intentionally, accidentally, or through malicious intent.
Instead of exerting effort to encourage people to adapt to the changes and adopt the technology, the IT professional is now able to work alongside their business counterparts to find innovative ways to use these new capabilities to achieve real results. This solves one of the biggest issues with any IT deployment, the engagement of the end user. Costs can also be reduced if the right policies are in place to manage the support and life cycle of devices.
BYOD and Choose Your Own Device (CYOD) devices come with some challenges that must be addressed in order to apply the appropriate controls to ensure the user remains productive while the company data is kept secure.